Reduced memory meet-in-the-middle attack against the NTRU private key

16Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

NTRU is a public-key cryptosystem introduced at ANTS-III. The two most used techniques in attacking the NTRU private key are meet-in-the-middle attacks and lattice-basis reduction attacks. Howgrave-Graham combined both techniques in 2007 and pointed out that the largest obstacle to attacks is the memory capacity that is required for the meet-in-the-middle phase. In the present paper an algorithm is presented that applies low-memory techniques to find 'golden' collisions to Odlyzko's meet-in-the-middle attack against the NTRU private key. Several aspects of NTRU secret keys and the algorithm are analysed. The running time of the algorithm with a maximum storage capacity of w is estimated and experimentally verified. Experiments indicate that decreasing the storage capacity w by a factor 1 < c < √w increases the running time by a factor √c.

Cite

CITATION STYLE

APA

Van Vredendaal, C. (2016). Reduced memory meet-in-the-middle attack against the NTRU private key. In LMS Journal of Computation and Mathematics (Vol. 19, pp. 43–57). Cambridge University Press. https://doi.org/10.1112/S1461157016000206

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free